Please use this identifier to cite or link to this item:
|Title:||Duel of the titans : the Romulus and Remus families of lightweight AEAD algorithms||Authors:||Iwata, Tetsu
|Keywords:||Science::Mathematics||Issue Date:||2020||Source:||Iwata, T., Khairallah, M., Minematsu, K., & Peyrin, T. (2020). Duel of the titans : the Romulus and Remus families of lightweight AEAD algorithms. IACR Transactions on Symmetric Cryptology, 2020(1), 43-120. doi:10.13154/tosc.v2020.i1.43-120||Journal:||IACR Transactions on Symmetric Cryptology||Abstract:||In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound with respect to the block-length n. The former uses a tweakable block cipher (TBC) as internal primitive and can be proven secure in the standard model. The later uses a block cipher (BC) as internal primitive and can be proven secure in the ideal cipher model. Both our modes allow to switch very easily from the nonce-respecting to the nonce-misuse scenario. Previous constructions, such as ΘCB3, are quite computationally efficient, yet needing a large memory for implementation, which makes them unsuitable for platforms where lightweight cryptography should play a key role. Romulus and Remus break this barrier by introducing a new architecture evolved from a BC mode COFB. They achieve the best of what can be possible with TBC – the optimal computational efficiency (rate-1 operation) and the minimum state size of a TBC mode (i.e., (n + t)-bit for n-bit block, t-bit tweak TBC), with almost equivalent provable security as ΘCB3. Actually, our comparisons show that both our designs present superior performances when compared to all other recent lightweight AEAD modes, being BC-based, TBC-based or sponge-based, in the nonce-respecting or nonce-misuse scenario. We eventually describe how to instantiate Romulus and Remus modes using the Skinny lightweight tweakable block cipher proposed at CRYPTO 2016, including the hardware implementation results.||URI:||https://hdl.handle.net/10356/145111||ISSN:||2519-173X||DOI:||10.13154/tosc.v2020.i1.43-120||Rights:||© 2020 Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin. This work is licensed under a Creative Commons Attribution 4.0 International License.||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SPMS Journal Articles|
Updated on Mar 5, 2021
Updated on May 23, 2022
Updated on May 23, 2022
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.